Pages

June 29, 2013

If PRISM doesn’t freak you out about cloud computing, maybe it should, says privacy expert“So effectively it’s a law aimed at the rest of the world. Now Americans can still get caught up in this law in a number of ways and that has been the focus of the American civil liberties groups campaigning against it but from the perspective of everybody else in the world, it is somewhat alarming that there is one law for Americans, and one law for everybody else.”

In-Memory Technology Speeds Up Data Analytics
The in-memory shift expands the possibilities for a database involved in real-time decision making, Lindquist says. Previously, getting a database to perform at the now-required level would call for a significant amount of tuning—configuring memory and carving out a data cache in RAM to improve performance. A cache hit is quicker than going back to disk for data, but a cache typically represents a small portion of the data stored in a database.

DR as a Service to address the Business Objectives
The Disaster Recovery as a Service (DRaaS) provided jointly by HCL Infosystems and Sanovi, will also be equipped to create an entire failover site infrastructure for customers. The service will also help address critical IT DR issues including those of interoperability owing to heterogeneous operating environments. Other features include continuous monitoring; automating manual DR processes, comprehensive reporting capabilities and flip of switch fail over and fall back options.

Why the internet of things has to be not too smart and not too dumb, but just right
“Just limiting the intelligence of the device isn’t going to solve the interaction problem,” Healey said at the annual Research@Intel event. Limit connected electronics to just “yes” or “no” questions and you’ll find yourself reintroducing yourself to them every single day. “The nightmare we’re going to face …. is something akin to what Bill Murray faced in the movie ‘Groundhog Day,’” Healey added.

A Bill Allowing More Foreign Workers Stirs a Tech Debate“In the short run, we don’t find really any adverse or superpositive effect on the employment of Americans,” said William R. Kerr, a Harvard business professor who conducted the study on the work force of 300 American companies. “People take an extremely one-sided view of this stuff and dismiss any evidence to the contrary.”

M2M and the Internet of Things: A guideThe 'things' in the IoT, or the 'machines' in M2M, are physical entities whose identity, state (or the state of whose surroundings) is capable of being relayed to an internet-connected IT infrastructure. Almost anything to which you can attach a sensor — a cow in a field, a container on a cargo vessel, the air-conditioning unit in your office, a lamppost in the street — can become a node in the Internet of Things.

Cisco fixes serious vulnerabilities in email, Web and content security appliancesReleases 7.1 and prior, 7.3, 7.5 and 7.6 of the software in the Cisco Email Security Appliance are affected by three vulnerabilities, one that allows remote attackers to inject and execute commands with elevated privileges through the Web interface and two that could be used to crash the management graphical user interface (GUI) or the IronPort Spam Quarantine service and cause other critical processes to become unresponsive.

How to Close the IT Talent GapA skills analysis of your IT team is one of the pivotal tools in your management toolbox. ... "It's crucial to do this type of analysis for workforce planning and career development because it helps employees understand what skills the business is going to need to achieve its goals," says Rachel Russell, director of marketing at TEKsystems. This, in turn, allows leadership teams to better plan for the future needs, but more than that, when done correctly, it builds employee engagement and helps retain staff longer

The secret behind many of the greatest dishes is patience and pacing. When you cook something slowly, at lower heat for a longer time, the flavors and textures can yield culinary masterpieces. The process of our own creations isn’t much different. Typically we’re searching for an answer with a deadline in mind. We’re generating an idea on a timeline in response to a creative brief, we’re trying to launch a new product or feature by a certain date to meet business goals and/or customer expectations.

"Japan has been able to maintain relatively low malware infection rates for many years. I often get asked by the customers and governments I talk to, what Japan’s secret is. I wrote an article on this in the past called, Japan - Lessons from Some of the Least Malware Infected Countries in the World – Part 5, which includes additional context from security professionals that live and work in Japan."